Skip to content

containernetworking/cni improper limitation of path name

High severity GitHub Reviewed Published Feb 15, 2022 to the GitHub Advisory Database • Updated Oct 2, 2023

Package

gomod github.com/containernetworking/cni (Go)

Affected versions

< 0.8.1

Patched versions

0.8.1

Description

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Specific Go Packages Affected

github.com/containernetworking/cni/pkg/invoke

References

Published by the National Vulnerability Database Mar 26, 2021
Reviewed May 18, 2021
Published to the GitHub Advisory Database Feb 15, 2022
Last updated Oct 2, 2023

Severity

High
7.2
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE ID

CVE-2021-20206

GHSA ID

GHSA-xjqr-g762-pxwp
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.